Publication Type

Co-author

Journals and Conferences

Owed to their versatile functionality and widespread adoption, PDF documents have become a popular avenue for user exploitation ranging from large-scale phishing attacks to targeted attacks. In this… (More)

Flash Crowds also referred as hot spots, is an outcome of a sudden, instantaneous peak in the network traffic requesting an online object. During this time, due to the massive number of requests for… (More)

Wi-Fi has become the de facto wireless technology for achieving short- to medium-range device connectivity. While early attempts to secure this technology have been proved inadequate in several… (More)

The efficacy of anomaly detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic view of the deployment… (More)

Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security researchers embraced virtual… (More)

The Mirai botnet and its variants and imitators are a wake-up call to the industry to better secure Internet of Things devices or risk exposing the Internet infrastructure to increasingly disruptive… (More)

Distributed Denial of Service (DDoS) attacks still pose a significant threat to critical infrastructure and Internet services alike. In this paper, we propose MOTAG, a moving target defense mechanism… (More)

Despite the growth of the Internet and the increasing concern for privacy of online communications, current deployments of anonymization networks depend on avery small set of nodes that volunteer… (More)